‘And makes it indistinct / As water is in water’: The melting away of the heroic subject in Antony and Cleopatra and All for Love

Author(s):  
Aspasia Velissariou

Premising the structural importance of water imagery in William Shakespeare’s Antony and Cleopatra, Antony’s ‘liquefaction’ reflects the core of his interiority, which is identified with his love affair with Cleopatra. Their desire requires a third party, Rome, in relation to which a seemingly self-enclosing erotic universe is built, and against which Antony fights for ascendancy, as a ghostly heroic self. In John Dryden’s All for Love, the historical flux vanishes, Antony’s heroic past figures as a residue and history as an embarrassment to love. In contrast with Shakespeare’s heroes, the lovers’ domestication foregrounds the compatibility of love and eros within marriage.

2014 ◽  
Vol 1 (1) ◽  
pp. 35-45
Author(s):  
Fenty Simanjuntak ◽  
Bobby Suryajaya

Many banks are looking for a better core banking system to support their business growth with a more efficient and flexible core banking system to improve their sales and services in the competitive market and to fulfill regulatory requirements. The decision of replacing the legacy core banking system is difficult due to the high IT investment cost required for banks because they are also trying to cut costs. But maintaining the legacy system is costly in terms of upgrade. Changing the core banking system is also a difficult process and increases risks. To have a successful Core Banking System implementation, risk assessment is required to be performed prior to starting any activities. The assessment can help project teams to identify the risks and then to mitigate the risks as part of the plan. In this research the Core Banking System replacement risks were assessed based on ISACA Framework for IT Risk. Fourteen risk scenarios related to Core Banking System Replacement were identified. The high and medium rated inherent risks can become medium and low residual risk after assessment by putting the relevant control in place. The result proves that by adding mitigation plan it will help to mitigate the Residual Risk to become low risk. There are still three residual risk which categorized as medium risk and should be further mitigated they are Software Implementation, Project Delivery and Selection/Performance of Third Party Suppliers. It is also found that COBIT 5 has considered some specific process capabilities that can be used to improve the processes to mitigate the medium risks.


2021 ◽  
Vol 11 (9) ◽  
pp. 4011
Author(s):  
Dan Wang ◽  
Jindong Zhao ◽  
Chunxiao Mu

In the field of modern bidding, electronic bidding leads a new trend of development, convenience and efficiency and other significant advantages effectively promote the reform and innovation of China’s bidding field. Nowadays, most systems require a strong and trusted third party to guarantee the integrity and security of the system. However, with the development of blockchain technology and the rise of privacy protection, researchers has begun to emphasize the core concept of decentralization. This paper introduces a decentralized electronic bidding system based on blockchain and smart contract. The system uses blockchain to replace the traditional database and uses chaincode to process business logic. In data interaction, encryption techniques such as zero-knowledge proof based on graph isomorphism are used to improve privacy protection, which improves the anonymity of participants, the privacy of data transmission, and the traceability and verifiable of data. Compared with other electronic bidding systems, this system is more secure and efficient, and has the nature of anonymous operation, which fully protects the privacy information in the bidding process.


Company Law ◽  
2020 ◽  
pp. 177-206
Author(s):  
Alan Dignam ◽  
John Lowry

Titles in the Core Text series take the reader straight to the heart of the subject, providing focused, concise, and reliable guides for students at all levels. This chapter examines derivative action as a means of safeguarding minority shareholders against abuses of power and its implications for the principle of majority rule. It begins by analysing the rule in Foss v Harbottle (1843), which translates the doctrine of separate legal personality, the statutory contract, the ‘internal management principle’, and the principle of majority rule into a rule of procedure governing locus standi (that is, who has standing to sue), as well as the exceptions to that rule. It then considers various types of shareholder actions, including personal claims, representative actions (group litigation), and derivative claims. It also discusses derivative claims under the Companies Act 2006, with emphasis on the two-stage process of the application for permission to continue a derivative claim. The chapter concludes by assessing bars to a derivative action, together with liability insurance and qualifying third party indemnity provisions.


2019 ◽  
Vol 12 (2) ◽  
pp. 629-649 ◽  
Author(s):  
Ahmed Attia ◽  
Adrian Sandu

Abstract. A flexible and highly extensible data assimilation testing suite, named DATeS, is described in this paper. DATeS aims to offer a unified testing environment that allows researchers to compare different data assimilation methodologies and understand their performance in various settings. The core of DATeS is implemented in Python and takes advantage of its object-oriented capabilities. The main components of the package (the numerical models, the data assimilation algorithms, the linear algebra solvers, and the time discretization routines) are independent of each other, which offers great flexibility to configure data assimilation applications. DATeS can interface easily with large third-party numerical models written in Fortran or in C, and with a plethora of external solvers.


Author(s):  
Anne C. Rouse

For the past 15 years, governments in the developed, Western world have been contracting out, or outsourcing, services as a key part of publicsector reforms. Outsourcing has been argued to lead to cost savings, improved discipline, better services, access to scarce skills, and the capacity for managers to focus more time on the core business of their organizations (Domberger, 1998). Government outsourcing initiatives have encompassed a range of services, but given the large sums of money invested in IT assets, the outsourcing of IT services (IT outsourcing, or ITO) has been a major initiative for many agencies. Lacity and Willcocks (1998, p. 3) defined ITO as “handing over to a third party [the] management of IS/IT assets, resources and/or activities for required results.” For public-sector outsourcing, this handover is usually made by way of a competitive tender. Case studies have reported ITO successes and failures (e.g., Currie & Willcocks, 1998; Rouse & Corbitt, 2003; Willcocks & Currie, 1997; Lacity and Willcocks, 2001; Willcocks & Kern, 1998), but much of the evidence presented to public-sector decision makers to justify this reform is anecdotal and unsystematic, and when investigated in depth, does not necessarily support widespread conclusions.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rodoula H. Tsiotsou

PurposeThe purpose of the study is to identify critical value-creating elements of luxury services expressed in ratings and reviews posted on third-party sites and examine cross-cultural differences. To this end, the research analyzed online ratings and reviews of luxury hotels posted on TripAdvisor from customers of four European regions (East, North, South and West).Design/methodology/approachEight hundred thirty-eight online user-generated ratings and reviews of luxury hotels were analyzed quantitatively using MANOVA and qualitatively using text analysis.FindingsThe study findings support (a) that product and physical evidence are the most critical experiential elements of luxury hotels' offerings and (b) cultural differences among tourists from various regions of Europe in their hotel ratings and reviews. Specifically, Eastern and Northern Europeans are more generous in their review ratings than western and southern Europeans. Moreover, eastern Europeans value the hotel's physical evidence/environment whereas western Europeans prioritize the core product (room and food) followed by the physical environment/servicescape. Southern Europeans and Northern Europeans value most the personnel, followed by the physical environment and the core product, respectively.Practical implicationsCultural differences provide several implications with regard to luxury services segmentation, social media management, service marketing mix development and hotel promotion.Originality/valueThe value of this study originates from studying post–purchase customer behavior in luxury services from a cross-cultural perspective. Moreover, identifying critical aspects of value-creating customer experience in a luxury context adds to the available literature.


2019 ◽  
Vol 47 (W1) ◽  
pp. W199-W205 ◽  
Author(s):  
Yuxing Liao ◽  
Jing Wang ◽  
Eric J Jaehnig ◽  
Zhiao Shi ◽  
Bing Zhang

Abstract WebGestalt is a popular tool for the interpretation of gene lists derived from large scale -omics studies. In the 2019 update, WebGestalt supports 12 organisms, 342 gene identifiers and 155 175 functional categories, as well as user-uploaded functional databases. To address the growing and unique need for phosphoproteomics data interpretation, we have implemented phosphosite set analysis to identify important kinases from phosphoproteomics data. We have completely redesigned result visualizations and user interfaces to improve user-friendliness and to provide multiple types of interactive and publication-ready figures. To facilitate comprehension of the enrichment results, we have implemented two methods to reduce redundancy between enriched gene sets. We introduced a web API for other applications to get data programmatically from the WebGestalt server or pass data to WebGestalt for analysis. We also wrapped the core computation into an R package called WebGestaltR for users to perform analysis locally or in third party workflows. WebGestalt can be freely accessed at http://www.webgestalt.org.


Author(s):  
Ashley Edwards

Adopted in the late 1930s, the Library Bill of Rights grounded the profession in the core value of intellectual freedom. This core value was challenged in the 1930s, the 1960s, the 1990s, and again in recent years by calls for social responsibility within our ranks. The re-occurrent discomfort with upholding intellectual freedom is particularly evident today in the case of public library third party meeting room bookings by controversial speakers. Both the Toronto Public Library and the Vancouver Public Library (as well as the Edmonton Public Library for lending its support) have come under scrutiny by both specific voices within the field as well as the community more broadly. This is not the first time, nor will it be the last time, that publicly funded libraries are faced with controversy surrounding intellectual freedom.   Using critical information theory, this presentation examines important questions: How is intellectual freedom defined, redefined and confined today? What is the relationship between the core value of intellectual freedom and sister core values such as social responsibility, diversity and democracy? How do we uphold professional ethics (e.g., IFLA Code for Librarians and Other Information Workers) in instances when our personal, professional, institutional and/or association commitments do not align? As a 2019-20 SLIS research assistant, these questions are rooted in my ongoing academic explorations with Dr. Samek of the nature and extent LIS curricula (for both professionals and paraprofessionals) prepares graduates to negotiate the perpetually complicated core value of intellectual freedom from a position of confidence, and not fear, defensiveness or divisiveness.


2020 ◽  
Vol 18 (2) ◽  
pp. 163-174
Author(s):  
Dragoș Costache

At the core of the European projects there is a fundamental tension between the securitarian and the humanitarian aspects of border and foreign policy, especially in its response to the Mediterranean Migration Crisis. This tension has far reaching consequences, from the outsourcing of border controls to third party states to fundamental changes in the makeup of the European Project. Starting from Etienne Balibar’s seminal question “what makes a border” I explore several facets of European border enforcement and the impact it is having on the European project.


Sign in / Sign up

Export Citation Format

Share Document